Keep Data out of Danger
April 3, 2017
If you haven’t seen “Attack of the Killer LOBs” yet, it’s coming soon to a DB2* environment near you. No, this isn’t a new science fiction movie—it’s a lurking danger in your environment today. Your vital data may have already been compromised, leaving you with a customer service, legal and compliance nightmare. Even worse, because […]
ArticlesTrend Watch: Security
March 27, 2017
This is the sixth post in a multi-part series with a focus on trends that are interesting and important, specifically in enterprise computing. In this post, I’ll continue my point-in-time analysis by looking at the interesting and complex topic of security. z/OS Security When someone says “mainframe security” you probably think RACF. However, if you […]
ArticlesTokenized Encryption: Getting Started
March 1, 2017
When I was engaged to implement cryptography and establish payment card industry (PCI) compliance, it was for a single division of a large conglomerate where each division had its own IT department with differing software, hardware, infrastructure and performed separate implementations. Although my client had the most processing platforms and data stores to integrate, and […]
ArticlesTokenized Encryption: Connecting Docs
February 1, 2017
This third and final article on documentation examines the information necessary to support a cryptographic interface oriented to CICS Transaction Server and MVS. While the focus is on mainframe environments, the principles and concepts apply to all IT systems. Likewise, except for specific programming languages and software, this information applies to all platforms. Function […]